ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Learning Serverless: Design, Develop, and Deploy with Confidence

دانلود کتاب یادگیری بدون سرور: طراحی، توسعه و استقرار با اطمینان

Learning Serverless: Design, Develop, and Deploy with Confidence

مشخصات کتاب

Learning Serverless: Design, Develop, and Deploy with Confidence

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1492057010, 9781492057017 
ناشر: O'Reilly Media 
سال نشر: 2020 
تعداد صفحات: 232
[233] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 10 Mb 

قیمت کتاب (تومان) : 36,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Learning Serverless: Design, Develop, and Deploy with Confidence به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب یادگیری بدون سرور: طراحی، توسعه و استقرار با اطمینان نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب یادگیری بدون سرور: طراحی، توسعه و استقرار با اطمینان

چه شرکت شما در حال بررسی محاسبات بدون سرور باشد یا قبلاً تصمیم به اتخاذ این مدل گرفته باشد، این کتاب کاربردی برای شما مناسب است. نویسنده Jason Katzer به توسعه دهندگان اولیه و اواسط حرفه ای نشان می دهد که چه چیزی برای ساخت و ارسال خدمات قابل نگهداری و مقیاس پذیر با استفاده از این مدل مورد نیاز است. با این کتاب، یاد خواهید گرفت که چگونه یک سیستم تولید مدرن در فضای ابری بسازید، که از طریق لنز محاسبات بدون سرور مشاهده می شود. متوجه خواهید شد که چگونه بدون سرور می تواند شما را از کار خسته کننده راه اندازی و نگهداری سیستم ها در تولید رها کند. شما همچنین راه‌های جدیدی را برای ارتقای سطح شغلی خود و طراحی، توسعه و استقرار با اطمینان کشف خواهید کرد. این کتاب در سه بخش شامل: • مسیر تولید: نکات و اجزای سیستم های توزیع شده، میکروسرویس ها، رابط ها، و معماری و الگوهای بدون سرور را بررسی کنید. • ابزارها: به نظارت، قابلیت مشاهده و هشدار، ورود به سیستم، خطوط لوله، اتوماسیون و استقرار شیرجه بزنید. • مفاهیم: یاد بگیرید چگونه امنیت و حریم خصوصی را طراحی کنید، چگونه کیفیت را از طریق آزمایش و مرحله بندی مدیریت کنید، و چگونه برای شکست برنامه ریزی کنید.


توضیحاتی درمورد کتاب به خارجی

Whether your company is considering serverless computing or has already made the decision to adopt this model, this practical book is for you. Author Jason Katzer shows early- and mid-career developers what's required to build and ship maintainable and scalable services using this model. With this book, you'll learn how to build a modern production system in the cloud, viewed through the lens of serverless computing. You'll discover how serverless can free you from the tedious task of setting up and maintaining systems in production. You'll also explore new ways to level up your career and design, develop, and deploy with confidence. In three parts, this book includes: • The Path to Production: Examine the ins and outs of distributed systems, microservices, interfaces, and serverless architecture and patterns • The Tools: Dive into monitoring, observability and alerting, logging, pipelines, automation, and deployment • Concepts: Learn how to design security and privacy, how to manage quality through testing and staging, and how to plan for failure



فهرست مطالب

Copyright
Table of Contents
Preface
	About This Book
	How This Book Is Organized
	Conventions Used in This Book
	O’Reilly Online Learning
	How to Contact Us
	Acknowledgments
Introduction to Serverless
	What Is Serverless?
		History of Serverless
		The Cloud Provider Landscape
		Reliability, Availability, Disaster Recovery
	Strengths of Serverless
		Increased Scalability, Security, and Reliability
		You Only Pay for What You Use
		Saving Time and Money on Managing Servers
		Improved Developer Productivity
		Decreased Management Responsibilities
		Convenient Integrations
	Weaknesses of Serverless
		The Cold (Start) War
		Compute Time
		VPC/Network Issues
		Application Size
		Potential to Be More Expensive
		Vendor Lock-In
		Complex Debugging
	When Does It Make Sense to Use Serverless?
	When Is Serverless Compute Not Right for You?
	Let’s Get Started
Part I. The Path to Production
	Chapter 1. Distributed Systems
		What Is a Distributed System?
		Why Do We Want a Distributed System?
		The Harsh Realities of Distributed Systems
			The Physical World
			Missing Messages
			Unreliable Clocks
			Cascading Failures
			Unexpected Ordering
			Idempotency
		What Am I Responsible For?
		What Do You Need to Consider When Designing a Distributed System?
			Loose Coupling (or Decoupling)
			Fault Tolerance
			Generating Unique (Primary) Keys
			Planning for Idempotency
			Two-Phase Changes
		Further Reading
		Conclusion
	Chapter 2. Microservices
		Why Do You Want to Use Microservices?
			Improved Developer Velocity
			Increased Developer Freedom
		Issues with Microservices
			Increased Complexity
			Proper DevOps Practices and Resources Needed
			Challenges with Local Development and Testing
		How Do You Use Microservices Effectively?
			Consistent Interfaces
			Loosely Coupled
		How Micro Is a Microservice?
		Choosing Between Monoliths and Microservices
			When Should You Use a Monolith?
			When Do You Want to Use Microservices?
		Conclusion
	Chapter 3. Serverless Architecture and Patterns
		The Role of an Architect
		What Do You Need to Know to Be an Architect?
		Making Decisions
			What Kinds of Decisions?
			Documenting Your Decisions
			How Do We Make Decisions?
			When Do We Make Decisions?
		Cloud Provider Components
			Streams
			Queues
			Buckets
			Compute
			Datastores
			Identity Service
			API Gateways
			GraphQL
			Networking
			State Machines
			Logging
			Monitoring and Alerting
		Events from Your Cloud Provider
			Periodic Invocations
		Patterns
			Example 1: Serverless Monolith
			Example 2: Incoming Webhook
			Example 3: Using Your Cloud Provider for User Authentication
			Example 4: Generic Background Task Pattern
			Example 5: Streaming Extract, Transform, Load
			Example 6: Create Your Own Polling Integration
			Example 7: Processing Files and Images
			Example 8: Migration Service Pattern
			Example 9: Fanning Out
		Conclusion
	Chapter 4. Interfaces
		Interfaces: Some Assembly Required
			The Message
			The Protocol
			The Contract
		Serverless Interfaces
			Automatic Retries and Dead Letter Queues
			Finite Versus Infinite Scale
		Designing Your Interfaces
			Messages/Payloads
			Sessions and Users/Auth
			Avoid Unbounded Requests
			Interface Versus Implementation
			Lines with Logic
		Designing the Unhappy Path
			Validating Input
			Failures
		Strategies for Integrating with Other Services
			Time-Outs
			Retries
			Exponential Backoff
			Webhooks
			Evaluating External Services
			Rate Limits
		Conclusion
Part II. The Tools
	Chapter 5. The Serverless Framework
		Why Use the Serverless Framework?
		When the Serverless Framework Isn’t for You
			AWS Is the Only First-Class Citizen
			AWS CloudFormation Is Not Perfect
			Relying on Strangers for Your Infrastructure
		What to Know Before You Start
			YAML
			Node.js
			Cloud Resources and Permissions
			Infrastructure Templates
			Production Secrets
			.gitignore
		The Components of a serverless.yml File
			Provider
			Environment
			Functions
			Resources
			Package
			Plug-Ins
			Custom
			Namespacing for Sanity and Security
		Using the serverless Command
			Installing Serverless
			Setting Up Serverless with Credentials
			Pulling in Templates Using serverless install
			Inspecting the Package of Our Sample Project (What’s Inside)
			Deployment
			Invoking the Function, and Viewing Logs
			Rollbacks
			Destroying the Service
			Deployment Packages
		Real-World serverless.yml
			Setting Environment Variables
			Modify Permissions
		Conclusion
	Chapter 6. Monitoring, Observability, and Alerting
		What Is Monitoring?
			Why Do We Need Monitoring?
			How Does Monitoring Relate to Serverless?
			The On-Ramp to Automation
		What Are My Options?
			Hosted SaaS Offerings
			Self-Hosted and Open Source
		Components of Monitoring
			Metrics
			Charts/Graphs
			Dashboards
			Alerts/Alarms
		A Selection of Advanced Practices
			Heartbeats
			Smoke Testing and/or Canaries
			The Most Important Metric in the World
			Avoiding Vendor Lock-In
			Cleaning Up Metrics and Alerts over Time
		Conclusion
	Chapter 7. Logging
		What Does It Mean to Log?
		Why Log?
		When to Rely on Logs Instead of Metrics
		What Should You Log?
		What Shouldn’t You Log?
		How Does Logging Work?
			Ensuring Your Logs Scale
			Structured Logging
			More Effective Debugging with Logs
			Searching Logs
			Exception Logging (Sentry)
		Collecting Other Logs
		Compliance
		Distributed Tracing
		Encrypting Logs for Privacy and Compliance
			Encrypt Only the Values of Sensitive Fields
			Encrypt the Entire Log Statement
		Conclusion
	Chapter 8. Changes, Automation, and Deployment Pipelines
		Dealing with Change
		The Role of Automation
			What Do We Automate?
		Getting Your Code Ready for Production
		Infrastructure as Code
		Database Changes (Migrations)
		Configuration Management
		What Is a Pipeline?
		Decisions to Make Regarding Your Pipeline
		Canaries and Blue/Green Deployments
			Pipeline Permissions
		Why Do You Need a Pipeline?
		Key Phases of a Deployment Pipeline
			Step 1. Enforce Standards
			Step 2. Build and Package
			Step 3. Test
			Step 4. Publish the Artifact
			Step 5. Deploy to the Target Environment
			Step 6. Validate Deployment
			Step 7. Roll Back if Necessary (and Possible)
		Handling Pipeline Failures
		Conclusion
Part III. Concepts
	Chapter 9. Security, Permissions, and Privacy
		Everyone Is Responsible, but You Are Especially Responsible
		Prepare to Be Hacked
			Understanding Your Threats and Your Attackers
			Design for Security
		Limit, Track, and Review All Secrets and Access
		Be Ready to Roll
			Defense in Depth
			Limit Blast Radius
			Trust but Verify
		Validate All User Input and Double-Check Those Settings
			Monitoring Your System for Anomalies
			Test Your Security
			Select Dependencies Carefully and Keep Your Software Up to Date
			Prioritize Privacy for Your Data and Your Customers’ Data
			Don’t Mess with Production
		Keep Your Machine Secure
		Keep Learning
		Conclusion
	Chapter 10. Quality, Testing, and Staging
		The Role of Code Quality
			Code Style
			Linting
		Testing
			What to Test and What Not to Test
			Types of Testing
			Code Coverage
			Power Up Your Testing
		Staging
		Conclusion
	Chapter 11. Planning for Failure
		Introduction: Understand It, Even if You Don’t Manage It
		Identify Risks
			Exercise: Finding Your Failure Points
		Be Prepared
		Making a Runbook
		Planning for Outages
			On-Call/Escalation Plan
		Monitor Your Cloud Provider
		Know Your (Service) Limits
		Conclusion
	Chapter 12. Conclusion
		Deciding among Vendors
		Community
		Gather the Advice of Others
		What to Do When You Get Stuck
		Taking the Next Step in Your Career
Index
About the Author
Colophon




نظرات کاربران